Which utility you will use to convert basic disks to dynamic disks on FileSrv1?
You had installed Windows Server 2008 on a computer and configured it as a file server,
named FileSrv1. The FileSrv1 computer contains four hard disks, which are configured as
basic disks.
For fault tolerance and performance you want to configure Redundant Array of Independent
Disks (RAID) 0 +1 on FileSrv1.
Which utility you will use to convert basic disks to dynamic disks on FileSrv1?
What should you do to manage certificate settings on all machines in a domain from one main location?
ABC.com has a domain controller that runs Windows Server 2008. The ABC.com network
boasts 40 Windows Vista client machines.
As an administrator at ABC.com, you want to deploy Active Directory Certificate service (AD
CS) to authorize the network users by issuing digital certificates.
What should you do to manage certificate settings on all machines in a domain from one
main location?
You need to perform an offline defragmentation of the Active Directory database on DC12
A domain controller named DC12 runs critical services. Restructuring of the organizational
unit hierarchy for the domain has been completed and unnecessary objects have been
deleted.
You need to perform an offline defragmentation of the Active Directory database on DC12.
You also need to ensure that the critical services remain online.
What should you do?
You need to replicate the AD LDS instance on a test computer that is located on the network
Your company has a server that runs Windows Server 2008 R2. The server runs an instance
of ActiveDirectory Lightweight Directory Services (AD LDS).
You need to replicate the AD LDS instance on a test computer that is located on the
network.
What should you do?
You need to ensure that all device certificate requests use the MD5 hash algorithm
Which command should you run on Computer1?
Your network contains an Active Directory domain.
You have a server named Server1 that runs Windows Server 2008 R2. Server1 is an
enterprise root certification authority (CA).
You have a client computer named Computer1 that runs Windows 7.
You enable automatic certificate enrollment for all client computers that run Windows 7.
You need to verify that the Windows 7 client computers can automatically enroll for
certificates.
Which command should you run on Computer1?
What should you configure in the adatum.com domain?
Your network contains two Active Directory forests named contoso.com and adatum.com.
The functional level of both forests is Windows Server 2008 R2. Each forest contains one
domain. Active Directory Certificate Services (AD CS) is configured in the contoso.com
forest to allow users from both forests to automatically enroll user certificates.
You need to ensure that all users in the adatum.com forest have a user certificate from the
contoso.com certification authority (CA).
What should you configure in the adatum.com domain?
You need to ensure that the external users can request certificates by using the new template
You have a server named Server1 that has the following Active Directory Certificate
Services (AD CS) role services installed:
Enterprise root certification authority (CA)
Certificate Enrollment Web Service
Certificate Enrollment Policy Web Service
You create a new certificate template.
External users report that the new template is unavailable when they request a new
certificate.
You verify that all other templates are available to the external users.
You need to ensure that the external users can request certificates by using the new
template.
What should you do on Server1?
You need to ensure that a certificate issued by the CA is valid
Your network contains an enterprise root certification authority (CA).
You need to ensure that a certificate issued by the CA is valid.
What should you do?
You need to immediately prevent the employee from logging on to the domain
You have an enterprise subordinate certification authority (CA). The CA issues smart card
logon certificates.
Users are required to log on to the domain by using a smart card.
Your company’s corporate security policy states that when an employee resigns, his ability
to log on to the network must be immediately revoked.
An employee resigns.
You need to immediately prevent the employee from logging on to the domain.
What should you do?